Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Philippines

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.196.104.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3507
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.196.104.114.		IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:28:51 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 114.104.196.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.104.196.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.79.158.132 attack
firewall-block, port(s): 22/tcp, 8291/tcp, 8728/tcp
2020-02-19 04:33:08
198.50.238.77 attack
Postfix Brute-Force reported by Fail2Ban
2020-02-19 05:06:21
178.128.14.102 attackspam
Feb 18 18:18:41 mail sshd\[7776\]: Invalid user test2 from 178.128.14.102
Feb 18 18:18:41 mail sshd\[7776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.14.102
Feb 18 18:18:43 mail sshd\[7776\]: Failed password for invalid user test2 from 178.128.14.102 port 46244 ssh2
...
2020-02-19 05:11:29
101.65.118.252 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 04:40:06
101.51.69.226 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 05:12:21
210.183.139.119 attack
Fail2Ban Ban Triggered
2020-02-19 04:59:32
185.220.101.65 attackspambots
02/18/2020-19:28:37.877093 185.220.101.65 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 33
2020-02-19 05:07:02
176.109.170.210 attackspam
" "
2020-02-19 05:08:32
222.186.31.83 attackspambots
Feb 18 21:53:31 localhost sshd\[2862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Feb 18 21:53:33 localhost sshd\[2862\]: Failed password for root from 222.186.31.83 port 23069 ssh2
Feb 18 21:53:35 localhost sshd\[2862\]: Failed password for root from 222.186.31.83 port 23069 ssh2
2020-02-19 04:56:35
51.38.225.124 attackbotsspam
Feb 18 19:13:44 ks10 sshd[1153962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.225.124 
Feb 18 19:13:45 ks10 sshd[1153962]: Failed password for invalid user huang from 51.38.225.124 port 46154 ssh2
...
2020-02-19 05:04:13
14.18.118.64 attackspambots
Invalid user guest from 14.18.118.64 port 57140
2020-02-19 05:11:14
185.220.102.8 attackbots
02/18/2020-21:19:48.471685 185.220.102.8 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 34
2020-02-19 05:00:31
5.237.142.122 attackspam
1582031981 - 02/18/2020 14:19:41 Host: 5.237.142.122/5.237.142.122 Port: 445 TCP Blocked
2020-02-19 04:52:43
107.172.143.244 attack
Feb 18 22:45:12 server sshd\[25617\]: Invalid user zhugf from 107.172.143.244
Feb 18 22:45:12 server sshd\[25617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.143.244 
Feb 18 22:45:14 server sshd\[25617\]: Failed password for invalid user zhugf from 107.172.143.244 port 43961 ssh2
Feb 18 22:51:45 server sshd\[26669\]: Invalid user deploy from 107.172.143.244
Feb 18 22:51:45 server sshd\[26669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.143.244 
...
2020-02-19 04:36:06
77.100.246.202 attackspam
77.100.246.202 - - \[18/Feb/2020:21:20:01 +0800\] "GET /wp-content/plugins/idx-broker-platinum/assets/css/idx-admin.css HTTP/1.1" 404 38287 "-" "Mozilla/4.0 \(compatible\; MSIE 6.0\; Windows NT 5.1\; SV1\)"
2020-02-19 04:32:49

Recently Reported IPs

103.19.152.81 103.196.76.53 103.195.83.117 103.197.132.244
103.197.133.205 103.197.133.50 103.197.206.14 103.195.236.217
103.197.222.117 103.199.145.166 103.199.114.2 103.199.157.238
103.199.70.197 103.200.37.197 103.200.84.19 103.203.56.2
103.203.72.203 103.20.3.95 103.200.134.42 103.206.55.114